The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
This book constitutes the thoroughly refereed proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2016, held in Porto, Portugal, in November 2016.
This book constitutes the proceedings of the 17th International Conference on Unconventional Computation and Natural Computation, UCNC 2018, held in Fontainebleau, France, in June 2018.
The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018.
This book constitutes the refereed proceedings of the First International Conference on Blockchain, ICBC 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018.
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in Malaga, Spain, in November 2017.
This book constitutes the refereed proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2018, held in Regensburg, Germany, in September 2018 in conjunction with DEXA 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
This book constitutes the refereed proceedings of the 5th International Conference on HCI in Business, Government and Organizations, HCIBGO 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017.
This book constitutes the refereed proceedings of the 19th Annual Conference on Towards Autonomous Robotics, TAROS 2018, held in Bristol, UK, in July 2018.
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2018, held in Regensburg, Germany, in September 2018.
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018.
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden.
In uralten Spielen wie Schach oder Go können sich die brillantesten Spieler verbessern, indem sie die von einer Maschine produzierten Strategien studieren.
In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories.
Dieses Buch stellt mit möglichst wenig mathematischen Hilfsmitteln die wesentlichen Grundbegriffe und Konzepte der Theorie fehlerkorrigierender Codes in der Datenübertragung dar.
Die Codierungstheorie, die sich mit Verfahren zur Erkennung und Korrektur von Fehlern bei Datenübertragungen und beim Auslesen von Speichermedien beschäftigt, ist heute aus Technik, Wirtschaft und aus unserem Alltag nicht mehr wegzudenken.
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.
Das Buch Nachrichtentechnik richtet sich an Studierende mit Studienschwerpunkten oder auch nur einzelnen Modulen aus dem Bereich der Informationstechnik und Informatik.
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text.
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing communication costs, improving computational efficiency, and enhancing the security level.
This is the revised edition of Berlekamp's famous book, 'Algebraic Coding Theory', originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
This book starts by presenting the basics of reinforcement learning using highly intuitive and easy-to-understand examples and applications, and then introduces the cutting-edge research advances that make reinforcement learning capable of out-performing most state-of-art systems, and even humans in a number of applications.